About PFX™
We engineer leading fluid solutions that keep the world moving and we’re building a better future while we do it. As a vertically integrated global powerhouse, we operate 17 manufacturing facilities and 4 R&D centers across the world, delivering performance from lab to road in over 40 countries.
PFX Group™ brings together a family of trusted companies including Recochem, Prestone, Adam’s Polishes, Kost USA, Ultra Clear, POR and Auto-Chem, each with deep expertise, regional insight, and a shared commitment to engineering excellence.
From automotive and heavy-duty thermal management systems to household and industrial solutions, our products are built for performance, reliability, and a commitment to sustainability. Join us and be part of a team that’s redefining what’s possible in fluid technology.
Role Overview
The Mid-Level Cybersecurity Analyst owns the detect-to-respond lifecycle across our hybrid estate (Azure, Microsoft 365, on-prem). You will hunt, investigate and eradicate threats; engineer new controls mapped to MITRE ATT&CK® and the Cyber Kill Chain®; operationalize threat intelligence (STIX/TAXII); drive vulnerability and risk assessments; strengthen email-security defences; and mentor junior analysts while partnering with Infrastructure, Cloud, DevOps and OT teams.
Key Responsibilities
Threat Hunting, Threat Intelligence & Detection Engineering
- Develop and tune Microsoft Sentinel analytic rules, KQL hunts and SOAR playbooks aligned to ATT&CK tactics (e.g., Initial Access, Defense Evasion).
- Build and curate Microsoft Sentinel dashboards that surface real-time security metrics and convert them into clear, executive-ready visuals.
- Ingest and curate feeds via STIX/TAXII; enrich events with IOCs, TTPs and campaign data; convert intelligence into new detections and weekly threat-intel digests.
- Maintain a detection-coverage matrix and continuously reduce false-positive rates.
Incident Response & Forensics
- Lead Tier 2/3 response using NIST 800-61 playbooks, documenting each Kill-Chain phase.
- Contain, eradicate and recover across Azure, M365 and on-prem assets; preserve evidence and deliver root-cause analyses within 48 hours.
Vulnerability & Risk Assessments
- Schedule and execute vulnerability scans, penetration tests and configuration reviews; correlate CVEs with ATT&CK techniques; track remediation to closure.
- Perform formal risk assessments on new projects, third-party integrations and legacy systems; present clear risk treatment plans to stakeholders.
Email Security & Anti-Phishing
- Manage Microsoft Defender for Office 365 policies (Safe Links, Safe Attachments, anti-phishing, DMARC, DKIM, SPF).
- Analyze phishing simulations and real-world campaigns; adjust detection heuristics and user-awareness training materials.
- Triage and examine complex quarantined e-mails; extract IOCs, determine threat origin, and escalate investigations when warranted.
Cloud & Identity Security
- Harden Azure resources (VNETs, NSGs, Azure Firewall, Defender for Cloud), enforce Conditional Access, MFA and Privileged Identity Management.
- Investigate anomalous sign-ins (token replay, MFA fatigue, impossible travel) and automate containment.
Device & Network Engineering
- Audit Fortinet firewalls, switches and VPNs (FortiGate, FortiAnalyzer, FortiManager).
Automation & Continuous Improvement
- Write PowerShell/Python scripts or Sentinel Logic Apps to automate enrichment (WHOIS, VirusTotal), containment and ticket creation.
- Integrate security scanning into CI/CD (Terraform/Bicep).
Governance & Compliance
- Align and implement controls to ISO 27001, NIST CSF, and CIS Controls v8, gathering audit evidence for SOC 2, GDPR, and PIPEDA compliance.
Required Qualifications
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- 3 to 5 years in security operations, incident response or threat-hunting roles.
- Hands-on expertise with Fortinet security platforms, Microsoft Sentinel, Microsoft Defender and Azure security controls.
- Proven experience operationalizing threat-intel feeds (STIX/TAXII) and performing vulnerability and risk assessments.
- Advanced scripting and data-query skills with PowerShell, Python, and Kusto Query Language (KQL).
- Excellent English communication skills; French is an asset.
- Certifications such as SC-200, CySA+, GCIA, GCIH, CISSP, CEH, OSCP, CISM.
- Experience building SOAR playbooks, Terraform/Bicep security modules or securing OT/ICS environments.
- Familiarity with privacy regulations (GDPR, PIPEDA, Quebec Law 25)
- Strong proficiency in English; bilingualism is an asset.